Infrastructure requirements

To host cloud challenges:

  • Cloud provider accounts (AWS/GCP/Azure): free tiers work for basic labs

  • Terraform/Ansible: automate deployment of vulnerable setups

  • Containerisation (Docker/Kubernetes): for isolated, ephemeral challenge environments

  • Monitoring and rate limiting: prevent abuse (AWS GuardDuty, custom scripts)

  • Flag validation system: auto-check exploit success (stolen secrets, RCE confirmation)

This combines with the cloud security reference material for

Approach: first set up secure pipelines for a small Dockerised app, then introduce the vulnerabilities the challenge is built around. This avoids building on a misremembered version of what “secure” looks like.